ABSTRACT

With the advanced development in the Internet of Everything and related domains, tons of data is generated daily from sensors and devices. This data travels through different layers in a complex and distributed network, which opens the door for leakage and manipulation of data, exposing it to privacy breaches.

Fog computing or fog-networking, conjointly referred to as fogging, is an associate design that uses edge devices to hold out a considerable quantity of computation, storage, and communication locally and routed over the Internet backbone. Also, fog computing is also known as the extension of the cloud computing paradigm to the edge of the network, therefore allowing an ecosystem to the various enterprise applications and services. The fog-computing services offer location sensitivity, decreased latency, geographical accessibility, connectivity (wireless), and improved data streaming.

In a fog network, various devices/nodes are added onto the trust factor among themselves as well as the fog node layer, which requires a good authentication method to establish this trustworthy relation/network among the different layers. Also, this trust/authentication is not only limited between nodes, but at the same time, fog-nodes communicate to cloud computing (vendors backend) and service the IoT devices/edge devices.

Additionally, trust and authentication are not the only challenges that exist today; there are more-like DOS attacks, end-user privacy, and many more. Therefore, maintaining privacy and providing secure channels is a huge and complicated task.

As part of this chapter, we will discuss the various challenges in existing robust and enterprise-level fog frameworks in the domain area of security and privacy.